Sign In

Communications of the ACM

Blogs Archive


Archives

The blog archive provides access to past blog postings from Communications of the ACM and other sources by date.

October 2014


From Schneier on Security

Friday Squid Blogging: Humboldt Squids Attack Submarine

Friday Squid Blogging: Humboldt Squids Attack Submarine

A pair of Humboldt squids attacked a Greenpeace submarine. There's video. As usual, you can also use this squid post to talk about the security stories in the news that I haven't covered....


From U.S. Public Policy Committee of the ACM

USPTO and NIST To Host Multistakeholder Meeting on Cybersecurity and Patents in Silicon Valley on November 14

The U.S. Patent and Trademark Office (USPTO), in partnership with the National Institute of Standards and Technology (NIST), will host the first multistakeholder Cybersecurity Partnership Meeting on November 14 in Menlo Park,


From The Computing Community Consortium Blog

Monitoring Vital Signs for the Elderly

The National Science Foundation recently featured University of Missouri computer scientist Marjorie Skubic in a Science360 radio episode. Skubic is engineering high speed networks that can remotely monitor movement and vital…


From The Eponymous Pickle

How Watson Works

How Watson Works

A straightforward, non-technical video of how Watson/Cognitive is designed to work,  implemented in the real world.    Worth a look if you are at all interested.  This does not mean that considerable work will be needed to use


From My Biased Coin

Harvard Junior Faculty Job Search

Harvard Junior Faculty Job Search

Harvard Computer Science is doing a junior faculty search this year.  We pretty much have been doing one every year, but it's nice to be able to make an announcement and point people to the ad.So here is the ad, telling you what


From Schneier on Security

The Ineffectiveness of Sealing the Border Against Ebola (and Other Viruses)

The Ineffectiveness of Sealing the Border Against Ebola (and Other Viruses)

Good analysis....


From The Eponymous Pickle

New Realities of Local Retail

New Realities of Local Retail

In ThinkwithGoogle:" ... The relationship between digital and local stores is changing—something we learned from our new Digital Impact on In-Store Shopping study, commissioned from Ipsos MediaCT and Sterling Brands. From it,


From The Eponymous Pickle

P&G to Spin off Duracell

P&G to Spin off Duracell

Not unexpected.  But the form of the move is unusual. Not a profitable enough business.  " .... Though P&G said that the Duracell has 'attractive operating profit margins... and cash generation,' it saw its growth prospects as


From The Eponymous Pickle

On the Role of the Chief Data Officer

On the Role of the Chief Data Officer

Excellent piece here. Have worked in the area of regulatory compliance.  Here the idea is to consider the more formal roles involved to address this problem systematically over time. " ... In today’s world, it is becoming increasingly


From Schneier on Security

Analysis of Printer Watermarking Techniques

Analysis of Printer Watermarking Techniques

Interesting paper: Maya Embar, Louis M. McHough IV, and William R. Wesselman, "Printer watermark obfuscation," Proceeding RIIT '14: Proceedings of the 3rd annual conference on Research in information technology: Abstract: Most


From The Eponymous Pickle

Former Apple Retail Store Manager Will help You Choose.

Former Apple Retail Store Manager Will help You Choose.

The Apple store is impressive.  An impressive showy blend of service, expertise and demonstration.   With lots of geeky camaraderie.The Genius Behind The Apple Store Wants To Help You Choose Your Next Gadget Former J.C. Penny


From The Eponymous Pickle

Google and AI with DeepMind

Google and AI with DeepMind

More examples of Cognitive, here with Google." ... Google, the search company that's investing heavily in robotics, is teaming with Oxford University researchers to work on artificial intelligence.In January, Google bought the


From The Computing Community Consortium Blog

Big Data in the Classroom

Data sets are growing rapidly. Yahoo, Google, and Amazon, work with data sets that consist of billions of items. The size and scale of data, which can be overwhelming today, will only increase as the Internet of Things matures…


From The Eponymous Pickle

Available Watson Cognitive Services

Available Watson Cognitive Services

Jim Spohrer points to a more complete list of Watson Bluemix services.  I am in the midst of exploring. Here is one example to give you an idea of the granularity of the cognitive offerings.  There are a total of 8 now, but they


From The Computing Community Consortium Blog

Reminder Call for Proposals: Creating Visions for Computing Research

The Computing Community Consortium (CCC) issued a new call for proposals for workshops that will catalyze and enable innovative research at the frontiers of computing.  The CCC encourages creative ideas from all segments of the…


From The Eponymous Pickle

Asimov on How People Get New Ideas

Asimov on How People Get New Ideas

In Technology Review:  Long ago, unpublished essay by beloved science and science fiction author Issac Asimov.  His writings inspired me starting in Jr High.   Good thoughts.


From Computational Complexity

Guest Post by Dr. Hajiaghayi: A new way to rank departments

(This is a guest post by MohammadTaghi Hajiaghayi. His name is not a typo- the first name really is MohammadTaghi.) Due to our belief in the lack of transparency and well-defined measures in methods used by U.S News to rankhere


From The Eponymous Pickle

Testing Machine to Machine Systems

Testing Machine to Machine Systems

Machines are easier to deal with than humans, at least when the machines are not compromised by humans.   This will increase in importance.   But is also implies the cognition of the process by humans.  Much more from the talk


From Computer Science Teacher – Thoughts and Information From Alfred Thompson

Instructions and Removing Ambiguity

Instructions and Removing Ambiguity

Recently I found the following image on Facebook. I plan to use it with my students this semester as a starting off point for conversation.

This is a perfect description of someone dealing with ambiguous instructions. Context


From The Eponymous Pickle

Protein Imaging Data

Protein Imaging Data

In Nature:  Heard much about this topic in R&D when we were still in health care product development.  " ... Data bank struggles as protein imaging ups its game Hybrid methods to solve structures of molecular machines create 


From The Eponymous Pickle

What's in Stock Nearby

What's in Stock Nearby

In Adage:  Macy's Links With Google To Show Mobile Users What's In Stock Nearby ... Find That Gift You've Been Looking for in the Right Size, Color and Price  ... " .  Call it Precision shopping.


From Schneier on Security

The NSA's Role in Commercial Cybersecurity

The NSA's Role in Commercial Cybersecurity

Susan Landau has a new paper on the NSA's increasing role in commercial cybersecurity. She argues that the NSA is the wrong organization to do this, and we need a more public and open government agency involved in commercial


From The Eponymous Pickle

Good Thoughts on E-Mail Responses

Good Thoughts on E-Mail Responses

Not about managing your email, but the often more important issue of how you should respond to serious questions in email. The most useful element: Pause.   " ... There is a simple two-step method to making the pause work for


From Gödel's Lost Letter and P=NP

A New Twist on Flexagons?

For Martin Gardner’s 100th birthday Martin Gardner introduced many including myself to the joys of Discrete Mathematics. His glorious monthly column “Mathematical Games” for Scientific American included some continuous mathematics


From Schneier on Security

Jumping Air Gaps with All-in-One Printers

Jumping Air Gaps with All-in-One Printers

Last week, Adi Shamir gave a presentation at Black Hat Europe on using all-in-one printers to control computers on the other side of air gaps. There's no paper yet, but two publications reported on the talk: Theoretically, if


From The Eponymous Pickle

Analyzing Ebola Data with Watson API

Analyzing Ebola Data with Watson API

Technical.A report via the Cognitive Systems Institute.Note this is Under Development.  Should not be used conclusively.  It is an example of using Watson services via Bluemix.Vikash Singh Ruhil. Data Scientist ( Graduate Assistant


From The Computing Community Consortium Blog

Ebola-Fighting Robots

Could robots really aid in the Ebola fight? On November 7th, robotics researchers from around the country will come together to try to answer that question. They will see if robots can prevent the spread of Ebola by possibly

      


From My Biased Coin

Cuckoo Filters

Cuckoo Filters

An upcoming paper appearing at CoNext will be of interest to any Bloom Filter user or aficionado:Cuckoo Filter:  Practically Better than Bloom(Bin Fan, David Andersen, Michael Kaminsky, Michael Mitzenmacher)Let me describe agithub


From Computational Complexity

MSR SVC Letters

The Committee for the Advancement of Theoretical Computer Science put together an open letter to several research leaders at Microsoft.

We feel that there should have been a better way to close down this lab, one that would
I


From The Computing Community Consortium Blog

NSF CISE Research Infrastructure (CRI) Program

The following is a National Science Foundation (NSF) Dear Colleague Letter (DCL) by the Directorate for Computer & Information Science & Engineering (CISE) Acting Assistant Director, Dr. Suzanne Iacono.   Dear Colleagues: Through…

« Prev 1 2 3 9 Next »